Methods, apparatus, and systems are disclosed for detection of a network signal identifying an electronic device in response to a transaction initiated by an entity. For example, the network signal can be transmitted by the electronic device in response to an initial network connection. An entity identifier identifies the entity associated with initiating a transaction based on matching identifying information contained in the network signal with transaction information from a supply chain. A configurator to configure the electronic device specific to the identified entity can be based on a feature set determined by channels through which the electronic device came to an end user. The feature set programs the electronic device to interoperate with a network device in response to the initial network connection.
|
7. A method comprising:
identifying an electronic device in response to a transaction initiated by an entity, the electronic device identified based on the transaction communicated as part of a network signal transmitted by the electronic device in response to an initial network connection, the transaction to trigger a recording of information associated with device configuration status, the device configuration status including previous configurations of the device;
identifying the entity associated with initiating a transaction based on transaction information from a supply chain; and
configuring the electronic device specific to the identified entity based on a feature set determined by channels through which the electronic device came to an end user, the feature set linked to a device identifier via a database associated with an intermediary of the supply chain, the feature set used to program the electronic device to establish a connection with a provisioning service in response to the initial network connection, the electronic device configured based on configuration instructions specific to the intermediary of the supply chain, the intermediary of the supply chain a retailer of the device, the configuration instructions based on the configuration status of the device.
1. An apparatus comprising:
at least one memory;
instructions in the apparatus; and
processor circuitry to execute the instructions to:
identify an electronic device in response to a transaction initiated by an entity, the electronic device identified based on the transaction communicated as part of a network signal transmitted by the electronic device in response to an initial network connection, the transaction to trigger a recording of information associated with device configuration status, the device configuration status including previous configurations of the device;
identify the entity associated with initiating a transaction based on transaction information from a supply chain; and
configure the electronic device specific to the identified entity based on a feature set determined by channels through which the electronic device came to an end user, the feature set linked to the device identifier via a database associated with an intermediary of the supply chain, the feature set used to program the electronic device to establish a connection with a provisioning service in response to the initial network connection, the electronic device configured based on configuration instructions specific to the intermediary of the supply chain, the intermediary of the supply chain a retailer of the device, the configuration instructions based on the configuration status of the device.
13. A non-transitory computer-readable storage disk or storage device comprising instructions thereon that when executed by a processor, cause the processor to at least:
identify an electronic device in response to a transaction initiated by an entity, the electronic device identified based on the transaction communicated as part of a network signal transmitted by the electronic device in response to an initial network connection, the transaction to trigger a recording of information associated with device configuration status, the device configuration status including previous configurations of the device;
identify the entity associated with initiating a transaction based on transaction information from a supply chain; and
configure the electronic device specific to the identified entity based on a feature set determined by channels through which the electronic device came to an end user, the feature set linked to the device identifier via a database associated with an intermediary of the supply chain, the feature set used to program the electronic device to establish a connection with a provisioning service in response to the initial network connection, the electronic device configured based on configuration instructions specific to the intermediary of the supply chain, the intermediary of the supply chain a retailer of the device, the configuration instructions based on the configuration status of the device.
2. The apparatus of
3. The apparatus of
4. The apparatus of
5. The apparatus of
6. The apparatus of
8. The method of
9. The method of
10. The method of
11. The method of
12. The method of
14. The non-transitory computer-readable storage disk or storage device of
15. The non-transitory computer-readable storage disk or storage device of
16. The non-transitory computer-readable storage disk or storage device of
17. The non-transitory computer-readable storage disk or storage device of
18. The non-transitory computer-readable storage disk or storage device of
19. The apparatus of
20. The apparatus of
|
This patent arises from a continuation of U.S. patent application Ser. No. 14/990,415, filed Jan. 7, 2016, now U.S. Pat. No. 10,229,444, which arises from a continuation of U.S. patent application Ser. No. 13/190,056, filed Jul. 25, 2011, now U.S. Pat. No. 9,240,984. U.S. patent application Ser. Nos. 14/990,415 and 13/190,056 are hereby incorporated herein by reference in their entireties.
The present disclosure relates in general to consumer electronic (CE) devices, e.g., customization of devices based on supply chain transactions. A common issue in the CE industry is that an intermediary in the supply chain, such as a retailer, would like to have CE devices customized by the manufacturer for their specific needs. The customization may be relatively minor, such as changing the color of the device, the texture of the finish, the user interface, the feature set, etc., to make the device unique for that retailer. This customization enables the retailer to make claims that their devices that are unique, enhancing the perceived value of the device as compared to devices sold at other retail outlets.
However, customization of products at the factory can cause difficulties for the manufacturer. For example, customization may require changes in the manufacturing process for each retailer. The manufacturer may have to inventory several different stock-keeping-units (SKUs) of a certain product, one for each customized version. These burdens may cause the manufacturer to impose minimum unit requirements and/or customization fees for such services. These fees are often too expensive for the retailer to pay, particularly in view of fierce price competition in the CE retail market.
The present disclosure is generally directed to customization of devices based on supply chain transactions. In one embodiment, a method involves receiving a first network signal indicating a device identifier in response to a transaction involving an electronic device uniquely associated with the device identifier. An entity identifier specific to an entity associated with the transaction is determined, and in response to an initialization event of the electronic device, a second network signal is received from the electronic device that identifies the electronic device. In response to the second network signal, a configuration is communicated to the electronic device that is specific to the entity associated with the transaction.
In another embodiment, a method involves determining, in response to a transaction involving an electronic device, a device identifier uniquely associated with the electronic device. At least the device identifier is communicated to a provisioning service in response to the transaction. The provisioning service determines an entity identifier of an entity associated with the transaction and configures the electronic device specific to the entity in response to a signal sent to the configuration service from the electronic device.
In another embodiment, an apparatus includes a data storage medium configured during manufacture to store at least a device identifier that distinguishes the apparatus from other apparatuses of the same type. A processor is configured to cause the apparatus to determine an initialization event, and in response to the initialization event, send a network signal to a provisioning service. The network signal communicates at least the identifier. The processor is further configured to cause the apparatus to receive a device configuration in response to the network signal and apply the configuration to the apparatus. The device configuration is specific to an entity in a supply chain through which the device traveled. The device identifier is linked to the entity via the provisioning service in response to a transaction occurring in the supply chain.
The above summary not intended to describe each disclosed embodiment or every implementation detail thereof. For a better understanding of variations and advantages, reference should be made to the drawings which form a further part hereof, and to accompanying descriptive matter, which illustrate and describe representative embodiments.
In the following diagrams, the same reference numbers may be used to identify similar/same components in multiple figures.
In the following description of various example embodiments, reference is made to the accompanying drawings that form a part hereof, and in which is shown by way of illustration various example embodiments. It is to be understood that other embodiments may be utilized, as structural and operational changes may be made without departing from the scope of the present invention.
The present disclosure is related to systems and methods that facilitate customizing consumer electronic (CE) devices based on the desires of an intermediary, such as a retailer or distributer. For example, an Internet enabled electronic device can be enhanced or customized post-production based on certain criteria learned and obtained during the distribution or retail process. This enhancement may include enabling new services or features, and/or providing a customized experience, e.g., a branded user interface.
Over the last few decades, CE devices have become not only more pervasive, but increasingly sophisticated. For example, even special-purpose devices such as televisions and appliances may have embedded processors with as much processing power as personal computers from decades past. These CE devices may also have other interfaces (such as user and network interfaces) that allow the devices to perform functions commonly associated with personal computers.
While the capabilities of modern CE devices may parallel those of personal computers, consumer expectations of how such devices should operate is markedly different from that of personal computers. For example, while users may be tolerant of the complexity that provides the ability (or need) to highly customize a personal computer, more often than not, they expect a traditional CE device to work right out of the box without any further work beyond the initial setup. Nonetheless, there exists a desire among some to be able to customize a CE device.
For example, most CE devices are produced by original equipment manufacturers (OEMs) that often rely on economies of scale to make devices that are affordable yet powerful and feature-rich. These devices are sold in large quantities to wholesalers or large retailers, and eventually are made available to the end user via a seller, such as a bricks-and-mortar store or Internet retailer. The competition between retailers is fierce, and the popularity of Internet sellers with extremely low margins means that even a large national retailer cannot always depend on price alone to ensure sales volume.
One way in which retailers can distinguish themselves is to provide exclusive devices. For example, in the past, some retailers had OEMs produce a store brand that the retailer alone was authorized to sell. These may have been custom designed products, although often were the same as an existing OEM model but with different branding (e.g., logos, labels, colors, packaging). However, such custom branding can incur significant costs, and may require large quantity orders to keep costs down. Even then, savvy consumers may still be able to detect a rebranded OEM product. Another disadvantage to store branding is that OEMs now spend significant effort in advertising and building goodwill for to their own brands, and it may be redundant (and even counterproductive) for a retailer to repeat that effort for a store brand that is functionally similar to a device branded by the OEM.
Instead of branding the external features of CE device, the present disclosure describes ways that entities in the supply chain can customize the internal state and/or function of a CE device when it is first activated (e.g., powered up) by the end user. This provides the appearance of a customized device, even though right out of the box, the device is substantially the same as other devices of the same type produced by an OEM. The embodiments described below allow CE devices having, e.g., the same model/SKU, to exhibit a different end-user experience due to a different channel of commerce through which the device traveled. The devices may be customized on initial setup and/or in response to any other event, such as initialization of new peripheral, software, service, etc., a software/firmware update, secondary sale or transfer of device, etc.
An example of a system and method that facilitates this device customization according to an example embodiment is shown in the block diagram of
Another source of device identifiers can be found in networking hardware. Where devices 104 have built-in network interfaces, such as Ethernet adapter or 802.11-type wireless adapter, the network interface will have a media access control (MAC) address that may be used as an identifier. The MAC address may be universally administered, meaning it is uniquely assigned to a device by its manufacturer, the manufacturer being identified by the first three octets of the MAC address. Therefore, the manufacturer (or a supplier for the manufacturer) may be able to ensure that devices 104 have a unique MAC address fixed in hardware, in which case the MAC address can be used in a similar way as a serial number in identifying a device.
During transactions associated with the devices 104, information about the devices 104 (e.g., represented by signals/paths 106-111) can be learned and associated with the devices 104 via a centralized entity 112, e.g., third-party provisioning service provider. The centralized entity 112 may include more than one apparatus or controlling party, e.g., a distributed entity acting as a single point of control. This association can be established by communicating at least the unique identifier of the devices 104 along with the learned information 106, 111. The learned information can be related to entities along the supply chain, which may include but are not limited to a distributor 114 who distributes the devices 104, the retailers 116, 118 who receive respective subsets of devices 104A, 104B for resale, and the buyers who buy respective individual devices 104C, 104D. The buyers may be the same as or different from end users 120, 122 who ultimately activate devices 104C, 104D.
The transactions that trigger recording of information 106-111 may include any significant event, pre- or post-sale, in which a configuration and/or reconfiguration may be desired. These transactions may include: the device being sold new or remanufactured; service changes related to the OEM 102, retailer 116, 118 and/or service provider 112; changes in the OEM or retailer contact information (e.g., phone number); attachment of a peripheral or other device with which the configured device may interact; device information that requires updating; etc.
The information 106-111 associated with the transaction may include identification of the selling retail channel (brick and mortar store, online, catalog, etc.), date, date range, extended services sold/associated with the device, content service packages, extended warranties, promotional offers, accessories, etc. The learned information 106-111 may vary based on aspects that are not necessarily directly related to the supply chain entities, such as time of transaction (e.g., during trial period, during warranty, after warranty expires), geographic location in which transactions take place, local regulations, or any other criteria that may be learned and associated with the devices 104.
After the devices 104C, 104D are in the hands of the end users 120, 122, the devices 104C, 104D can establish connections with a provisioning service (e.g., the centralized entity 112) in response to an initialization event. The provisioning service 112 can access the learned information, and in response provide information 110, 111 to the devices to configure, enhance, update, and/or otherwise modify the devices based on the desires of the channels through which the device came to the end-users 120, 122. The modifications may include modifying the user interface or any graphics or text placed on screens, skins (e.g., a graphical theme applied to user interface components), reposition of content service, phone numbers, logos, name of service offerings, ability to add new features or applications, addition/removal of content services (trial or permanent), addition/removal of features of the device, enabling/disabling features of the device (e.g., affecting license fees), enabling/adding promotions, language/internationalization, etc.
It is to be understood that the end users 120, 122 may also participate as intermediaries in the supply chain. For example, consider a company that installs electronic signage in buildings using commercially available televisions for displays. The company may purchase large quantities of televisions from a distributer and, depending on business arrangements with customers regarding the devices (e.g., sell, lease), the company may be considered a reseller or an end user. The company may need each television to be set up in a particular way, and it could be time consuming to do so manually. In order to facilitate automatic configuration, the company could establish an account with the centralized entity 112 and register each television set purchased, e.g., using an optical scanner at a receiving dock. Thereafter, once the televisions are physically installed on-site, they may be automatically configured as desired after being powered on and connecting to a network. In such a case, the company may register a wide variety of television models that they use for different types of installations. This could provide additional efficiencies, e.g., avoid having to train installers on how to configure different models of televisions.
As described above, the initialization event that triggers information 110, 111 being sent to configure devices 104C, 104D may at least include a first power-on event and/or connection to a local network. This initialization event may include any events that are detected by the devices 104C, 104D, or detected elsewhere and communicated to the devices 104C, 140D, either via the provisioning service 112 or by an out-of-band communications mechanism. For example, the event may be triggered by a change in information (e.g., an OEM's or retailer's phone number, device information), a change in a configuration of the device, the device becoming Internet enabled, device changing the type of connection, device being connected via a different service provider, new content services being offered, installed or enabled in the device, new devices/peripherals are attached to the device (e.g. a new WiFi module, a new gaming device, etc).
The system and method shown in
In reference now to
The hardware 202 may also include specialized components for providing a primary function of the device, as indicated by block 210. This component 210 may be considered part of or separate from the I/O circuitry 208, and may perform functions such as display, sound, sensors, tuners, signal processors, conditioning circuitry, power supplies, motors, etc. These functions may be those commonly associated with the device 200. For example, if the device 200 is a television, the functions may include hardware for display, sound reproduction, tuning, signal processing, switches for accepting user input, etc.
Various aspects of the functional components 210 (as well as other components of the hardware 202) may be amendable to being customized according to the desires of an intermediary in the supply chain. These customization options are represented here by customizable elements 212. The elements 212 may include any combination of hardware, executable instructions, firmware, configuration data, content, etc., that can be selectably activated, deactivated, and/or modified to provide an experience for the particular device 200 that distinguishes it from other devices of the same type, e.g., having the same model number.
For example, element 214 relates to customization of a user interface. The user interface element 214 can provide many aspects of custom branding, e.g., emphasizing that the device 200 is special based on the channel of commerce by which it arrived compared to the same model that might be obtained elsewhere. For example, where the device 200 has display hardware, the user interface component 214 may be used to affect such features as colors, graphics/logos, fonts, languages, menu structures, etc. The user interface component 214 may also be used to affect other user interface features, such as sounds, buttons/switches, force-feedback devices, indicator lights, etc.
The user interface component 214 may also be used to modify, activate and/or deactivate certain functions/features at least by prevent a user from accessing them from the provided user interface. Others of the elements 212 may also provide a similar function independently of the user interface. For example, element 216 may be able to activate/deactivate certain hardware functions, e.g., by writing to a register. The actions associated with the element 216 may also extend to activating/deactivating software features such as protocols, codecs, drivers, etc., that may be dedicated to or separate from the hardware functions. For example, if the device 200 has a microphone, the element 216 may be able to selectively enable/disable the microphone, as well as enabling/disabling voice recognition software that uses the microphone, e.g., to process voice commands.
Element 218 represents configurable content and/or service providers that may be associated with the device. For example, a device 200 such as a television may have certain content stored such as pictures, videos, music, etc. This content may be for purely demonstration purposes, and/or may have another purpose (e.g., video instruction manual). Similarly, service providers may provide similar content over a network, and may provide other data services known in the art. Example provider services include streaming media, news, weather, cloud data storage, channel listings, etc. The activation of these services and/or content could be contingent on a purchase that happened contemporaneously with the purchase of the device 200.
Element 220 represents default settings of the device 200 that may be customized. These settings may be available in any device of this type, but element 220 could set some settings different than the manufacturer's for purposes of convenience, e.g., starting with a default language/locale corresponding to a geographical location where the device 200 was sold. This may also tie in to other services/devices that were purchased with the device 200 (or beforehand, e.g., from the same retailer). For example, if the device 200 was a television that was purchased together with (or after) a set top box, universal remote, and HDMI cable, the defaults for the television and set-top box could be set to utilize the HDMI inputs/outputs at startup, and the remote could be programmed to default to the correct codes that will enable to remote to operate the television and set-top box.
Also pertaining to the purchase of the device 200, certain warranty and service information could be enabled via element 222. This element 222 could configure a status screen that shows date of purchase, location of purchase, show/store a copy of the receipt, indicate remaining warranty period, etc. The element 222 could also be configured to show access to extended warranties, service contracts, etc., that were purchased with the device. In another example, the element 222 could customize user interfaces to display phone numbers, uniform resource locators (URLs), etc., for obtaining service in case of a malfunction.
Element 224 represents configurability of advertising/promotions that may be made available via the device 200. For example, the device 200 may have a service enabled via element 218 that provides special offers by the retailer from which the device 200 was purchased. The component 224 could be used to activate limited time (e.g., expires 30 days from purchase) offers, and be regularly updated to provider continuing offers via the service.
In order to provide customization according to any of the elements 212, the apparatus 200 may include one or more functional modules, as represented by customization module 230. Generally, the customization module 230 receives signals, e.g., via a network, having information that instructs the module 230 to perform an operation on one or more customizable elements 212. These signals may received in response to a event detected/triggered by the apparatus 200, such as initialization of the apparatus 200, although similar information may communicated any time during the life of the apparatus 200. The information received in the signals may indicate both the affected elements 212 and the desired modification to said elements 212. The information may take any form, although in one example they may take the form of a structured data file such as an extensible markup language (XML) formatted file. In other cases, the information may include computer executable code, e.g., firmware updates, programs, object files, applets, scripts, etc.
One functional component contained within module 230 is represented by network access component 232. The network access component 232 may deal with any aspects related to reaching a centralized entity (e.g., entity 112 in
Once the network access module 232 has enabled communication with a centralized entity 112, a database access module 234 can interact with the entity 112 for purposes of querying, retrieving, parsing, locally storing, and locally applying customization. The database access module 234 may utilize any form of retrieval, such as file transfer requests, invoking Web Services methods (e.g., simple object access protocol, or SOAP), invoking methods via HTTP PUT/GET methods, structured query language (SQL) queries, etc. The database access module 234 will generally pass this information along to an execution module 236, which applies the retrieved information to the customizable elements 212.
The execution module 234 generally performs sequences of tasks related to applying and verifying changes to the customizable elements 212. These tasks may be customized for each device 200, although for efficiency it may be preferable to utilize an interface layer (e.g., application program interface or API) that enables a common execution module 236 to work with a wide variety of products. Intermediary code, as represented by OEM adapter 238, can be prepared for each product to interface with custom hardware 202 and/or customizable elements 212 associated with the particular device 200.
While the illustrated adaptations to the device facilitate a wide range of modification, the OEM may want to ensure a default behavior/appearance that provides at least the advertised features and an appearance desired by the manufacturer. Default module 240 may include instructions and/or data that provides this default state. This module 240 may also act as a “safe” mode of operation, e.g., that can be defaulted to in the event of an error in modules 230 and/or elements 212. Finally, authentication module 242 can provide security. For example, the module 242 may ensure operation/activation any of the modules 240 and/or elements 212 is authorized. In the event some functions may require a payment or subscription, and so service provider may wish to make sure such features are not activated by unauthorized parties. The authentication/security module 242 may also be used to confirm integrity of hardware and software of the device 200, e.g., to detect and thwart attempts at tampering with the device 200.
In another configuration, the authentication module 242 may also facilitate storing and accessing a unique identifier of the device (e.g., serial number). The unique identifier may be stored in persistent storage 206 during manufacture (e.g., firmware or hardware encoded) and is later used for receiving configuration data from a provisioning service. The module 242 may provide a way of ensuring an alternate identifier cannot be used. For example, although a MAC address can be unique, it can sometimes be changed (e.g., via a driver) through what is sometimes referred to as MAC address cloning. In such a case, the module 242 (or equivalent function) can ensure that the correct identifier is sent to a provisioning service even if the MAC address of the network interface has been altered for purposes of network communications.
In reference now to
Any number of customizable attributes 306 can be enabled into the device 308 by the manufacturers prior to shipment. The retailers 300, 302 can choose which of these attributes can be changed and what they can be changed to through the use of the embodiments described herein. If the retailers 300, 302 make no choice as to a particular option, then the OEM can provide defaults (e.g., elements X, Y, Z in 306 may represent OEM defaults). The retailers 300, 302 and/or manufacturer(s) 304 can register these elements (and descriptions thereof) in a centralized service 314. For example, the manufacturer 304 may predefine the description of the customizable elements 306, as well as allowable values of those elements 306. For example, GUI service interface Y may be configured by providing a data file in an acceptable format (e.g., markup language, digital image, etc.). The service provider option X and functional component Z may be defined (e.g., in a markup language document) using selectable parameters, e.g., “enabled,” “disabled,” “first listed,” etc. This agreement between the 300, 302 and/or manufacturer(s) 304 can be used to establish and/or populate a database 316.
During the retail sales process, a procedure is used by each retailer to track which devices have been sold by the retailer. An example of this procedure is shown in the block diagram of
In some situations, the identifier 402 may be considered globally unique, e.g., it is unlikely two items will have the same identifier regardless of the type of item. This may be the case where the identifier 402 is a physical MAC layer address, for example. Uniqueness of a MAC address may be enforceable by way of the address range assigned to the manufacturer, and further by how the manufacturer assigns the addresses within that range. A serial number used as identifier 402 may or may not be globally unique. For example, it may be difficult for manufacturers to ensure unique serial numbers, as there may be no central entity that governs serial numbers in a way similar to MAC addresses. However, so long as the identifier 402 is unique for at least the particular type/model of device 400, a second identifier 404 may be used in combination with unique identifier 402 to ensure the device can be uniquely identified for purposes of customization described herein. The secondary identifier 404 may include any one or more of part number, model number, SKU, version number, etc. In the description that follows, the description of the unique identifier 402 is understood to optionally include the secondary identifier 404.
The device identifier data 402 can be captured at the time of sale and sent via a network to service 314 described in
Another piece of information that may be expressly or inherently communicated to the service 314 regarding the transaction is an identifier 408 of the entity (e.g., retailer) to which the transaction pertains. This identifier 408 may be expressly communicated with the identifier 402 during the event, or may be inferred, e.g., by the channel of communication used to communicate the device identifier 402. As shown by way of example SQL INSERT statement 410, the transaction results in a linkage being created between the device identifier 402 and the entity identifier 408. This linkage 410 could also be made inherently, e.g., the retailer could have a dedicated table to which device identifiers 402 are added. Also, the linkage 410 need not be expressly made between device identifier 402 and entity identifier 408. For example, data describing a feature set for the device 400 could be obtained using the identifiers 402, 408, and a table could list/link this feature set with the device identifier 402. Thus, while the entity identifier 408 is used to retrieve the feature set, the express linkage in such a case is made between the feature set and the device identifier 402, and not between the device identifier 402 and the entity identifier 408.
In reference now to
The device agent 502 can determine to what provisioning service 314 to which the device 400 can connect. For example, the device agent 502 may be pre-configured with a built-in provisioning service identifier 504 (e.g., URL). In other configurations, the device agent 502 may use network service discovery to determine some or all aspects of the service's identity. Upon initialization/connection of the device 400, the device agent 502 registers 506 the device 400 with the provisioning service 314. The registration 506 may involve sending a unique identifier associated with the device 400 so that the previously entered linkage data (e.g., via statement 410 in
As represented by SQL query 508 to database 316, the provisioning service 314 determines a feature set 510 associated with the device 400. This feature set 510 is determined by linkage in the database 406 of the retailer that sold the device 400. The feature set 510 is also based on the set of rules established by the manufacturer and the retailer for this device 400. Additional features may be included in set 510 that may have occurred after the manufacturer and retailer established the rules. For example, the features may include a general purpose channel/feature for providing bargains, advertising, offers, etc. via device 400, but the actual content of that channel/feature may not be established until the transaction in
The provisioning service 314 applies 512 the changes to the device 400 via the Internet or using any other two-way communications. This may involve the device 400 verifying, parsing, and applying communicated data (e.g., feature set 510) to internal storage. This data 510 may be directly used to modify the device 400, and/or may be used to activate data already stored on the device 400. After application of the data 501, the device 400 has is enhanced and customized to the retailer's needs. This customization occurs without the manufacturer having to do it in the factory, and without the manufacturer having to inventory several different SKUs of the same product, each customized for a different retailer. The customized attributes can be fixed for all devices in a device group and/or can be defined on a per device basis based on services sold with the device or promotions which apply to the device at time of sale. The retailer can make changes to these attributes post sale as well based on whatever criteria they wish.
In reference now to
The memory 605 may include volatile memory (e.g., random access memory, or RAM) and non-volatile memory (e.g., hard disk drives, solid-state drives, optical media, etc.). The memory 605 can store instructions, represented as operational software 610, which are operable by the processor 604 to perform functions described herein. It will be understood that operations performed by software 610 may be implemented in whole or in part in hardware and/or firmware, and description of functions being performed by software is not intended to be limiting.
As illustrated, the apparatus is coupled to one or more networks 612 via network interface(s) 608 for communication with manufacturers 614, supply chain intermediaries 616, and consumer electronic devices 618. The interactions described between the service arrangement 600 and entities/devices 614, 616, 618 may also occur via other data transfer interfaces, including local I/O ports 606 and user interface 607. Generally, the modules shown as part of software 610 facilitate these communications independently of the actual communication paths used.
The software 610 includes one or more OEM/retailer interfaces 620 that provide a common layer usable by manufacturers 614 and intermediaries for managing customization features such as previously described regarding
A linkage/update module 624 may be used by manufacturer 614 and/or intermediaries 616 to maintain in-process data related to individual devices and/or classes of devices that have been previously established via configuration module 622. For example, module 624 may handle linking of purchases and other transactions to particular devices 618, such as CE devices described in
A separate interface 628 may be used to interact with devices 618 during initialization and possibly thereafter. As with interface 620, this interface 628 may deal with common connection tasks such as establishing connections, data transport, authentication, etc. A registration module 632 may handle device-initiated signaling that indicates the devices 618 are ready to receive and initial configuration. An update module 630 may be used to apply updates 618 to devices thereafter, either upon request of the devices 618 or pushed to the devices 618 from the service arrangement 600.
Generally, the arrangement 600 facilitates centralized operations associated with customizing individual devices 618. Customization attributes for each device or device group (e.g., content services, support services, and/or other content that may be installed or enabled on the device) can be stored in database 634 for later retrieval. At any point during or after a sales transaction, the database information regarding the device 618 and the attributes associated with the customization of the device 618 is transmitted or otherwise made available for use to the provisioning service 600 when processing the device registration request. One option is for a database of information to be stored locally (e.g., with retailer or other intermediary that processed the transaction) and then made available to the party responsible for customization of the device (e.g., via a network service provided by the intermediary). Another option is for the data to be transmitted to the customization service provider during or after the sales transaction.
At any time after the sales transaction concludes and a device 618 is setup for use, the device 618 establishes a connection with the provisioning service 600. This process is referred to as device registration. As part of the registration, or in a process that follows registration, the provisioning service 600 utilizes the retail database 634 to determine what customization should be applied to the device 618 based on the rules setup for the customization. The provisioning service 600 initiates the activities necessary to enable/disable, activate/deactivate, install/uninstall, update or otherwise change the device 618 to support the desired customization needs.
For purposes of illustration, the operation of the devices is described in terms of functional circuit/software modules that interact to provide particular results. Those skilled in the art will appreciate that other arrangements of functional modules are possible. Further, one skilled in the art can readily implement such described functionality, either at a modular level or as a whole, using knowledge generally known in the art. The computing structures are only a representative example of devices and services that enable customizing CE devices as described herein. For example, the functions of the service arrangement 600 can be distributed over a large number of processing and network elements, and can be integrated with other services, such as Web services, gateways, mobile communications messaging, etc. For example, the functions of the service arrangement may be distributed between any combination of the manufacturer 614, one or more intermediaries 616, and a third party.
In reference now to
At 702, an entity identifier specific to an entity associated with the transaction is determined. The entity may include a retailer and/or any other intermediary in the supply chain. In response to these previous operations 700, 702, the electronic device may optionally 704 be linked to the entity in a database in response to the first network signal.
In response to an initialization event of the electronic device, a second network signal is received 706 from the electronic device that identifies the electronic device. In response to the second network signal, a configuration may optionally be retrieved 708 via a database. In whatever way the configuration may be obtained, the configuration is communicated 710 to the electronic device that is specific to the entity associated with the transaction.
In reference now to
Additional data related to the transaction may also be optionally communicated 806 to the provisioning service. The additional data is used to modify a configuration of the electronic device specific to the transaction. The additional data may include data describing an additional transaction related to the electronic device. The additional transaction may include any of: a purchase of a service contract related to the electronic device; content usable by the electronic device; a network service usable by the electronic device; and a second device usable with the electronic device.
At least one of these communications 802, 804, 806, causes 808 the provisioning service to determine the entity identifier and configure the electronic device specific to the entity in response to a signal sent to the configuration service from the electronic device.
The foregoing description of the example embodiments has been presented for the purposes of illustration and description. It is not intended to be exhaustive or to limit the inventive concepts to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. It is intended that the scope of the invention be limited not with this detailed description, but rather determined by the claims appended hereto.
Taylor, Robert Edward, Thielen, Kurt Roman, Sansonetti, Patrick James, Melville, Ryan Michael, Alviani, James Joseph
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
6591098, | Nov 07 2000 | AT&T MOBILITY II LLC | System and method for using a temporary electronic serial number for over-the-air activation of a mobile device |
7260382, | Sep 21 2004 | Sprint Spectrum LLC | Method and system for customizing a wireless device's user-interface based on which vendor distributed the wireless device |
8060414, | May 25 2010 | Amazon Technologies, Inc | Encoding and decoding of product properties in a uniform resource locator |
8214880, | Jun 22 2006 | Verizon Patent and Licensing Inc | Methods and systems for securely configuring a network device |
8583091, | Sep 06 2010 | T-MOBILE INNOVATIONS LLC | Dynamic loading, unloading, and caching of alternate complete interfaces |
8925069, | Jan 07 2013 | Apple Inc. | Accessory device authentication using list of known good devices maintained by host device |
9123062, | Feb 18 2011 | T-MOBILE INNOVATIONS LLC | Ad sponsored interface pack |
9240984, | Jul 25 2011 | UNIVERSAL ELECTRONICS INC | Configuring an electronic device based on a transaction |
9589290, | Dec 31 2014 | BLOCK, INC | Client-side use of customer preferences |
20030018889, | |||
20030149981, | |||
20050079863, | |||
20050275566, | |||
20050283410, | |||
20060015520, | |||
20060030315, | |||
20060035631, | |||
20060143572, | |||
20060173974, | |||
20070113186, | |||
20070121869, | |||
20070130156, | |||
20090132682, | |||
20090138955, | |||
20090181662, | |||
20090217348, | |||
20090313466, | |||
20090327398, | |||
20100042510, | |||
20100115582, | |||
20100154009, | |||
20100180016, | |||
20100257363, | |||
20110112926, | |||
20110252457, | |||
20110306343, | |||
20120023157, | |||
20120036552, | |||
20120047227, | |||
20120254946, | |||
20130031350, | |||
20130295902, | |||
20140115340, | |||
20140148503, | |||
20150112826, | |||
20160117747, | |||
20180253683, | |||
20200029118, | |||
20200065473, | |||
20210133814, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jul 15 2011 | THIELEN, KEVIN ROMAN | UPDATELOGIC, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049203 | /0489 | |
Jul 15 2011 | SANSONETTI, PATRICK JAMES | UPDATELOGIC, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049203 | /0489 | |
Jul 15 2011 | MELVILLE, RYAN MICHAEL | UPDATELOGIC, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049203 | /0489 | |
Jul 15 2011 | ALVIANI, JAMES JOSEPH | UPDATELOGIC, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049203 | /0489 | |
Jul 19 2011 | TAYLOR, ROBERT EDWARD | UPDATELOGIC, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049203 | /0489 | |
Sep 14 2012 | UNIVERSAL ELECTRONICS INC | U S BANK NATIONAL ASSOCIATION | SECURITY INTEREST SEE DOCUMENT FOR DETAILS | 067417 | /0402 | |
Nov 14 2014 | UPDATELOGIC, INC | QTERICS, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049203 | /0776 | |
May 13 2015 | Silicon Image, Inc | Lattice Semiconductor Corporation | MERGER SEE DOCUMENT FOR DETAILS | 049203 | /0794 | |
Apr 06 2016 | Lattice Semiconductor Corporation | QTERICS, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049203 | /0813 | |
Apr 19 2016 | Lattice Semiconductor Corporation | THE NIELSEN COMPANY US , LLC | PURCHASE AGREEMENT | 049216 | /0159 | |
Jul 05 2016 | QTERICS, INC | THE NIELSEN COMPANY US , LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 049203 | /0860 | |
Jun 01 2017 | UPDATELOGIC, INC | QTERICS, INC | MERGER SEE DOCUMENT FOR DETAILS | 058728 | /0237 | |
Mar 11 2019 | Universal Electronics Inc. | (assignment on the face of the patent) | / | |||
Jun 04 2020 | CZT ACN TRADEMARKS, L L C | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | NIELSEN FINANCE CO | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | NIELSEN CONSUMER NEUROSCIENCE, INC | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | NIELSEN CONSUMER INSIGHTS, INC | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | NIELSEN AUDIO, INC | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | NETRATINGS, LLC | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | GRACENOTE MEDIA SERVICES, LLC | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | GRACENOTE DIGITAL VENTURES, LLC | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | GRACENOTE, INC | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | EXELATE, INC | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | NIELSEN INTERNATIONAL HOLDINGS, INC | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | NIELSEN MOBILE, LLC | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | NMR INVESTING I, INC | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | GRACENOTE DIGITAL VENTURES, LLC | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | VNU INTERNATIONAL B V | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | THE NIELSEN COMPANY B V | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | NIELSEN HOLDING AND FINANCE B V | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | NMR LICENSING ASSOCIATES, L P | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | VNU MARKETING INFORMATION, INC | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | VIZU CORPORATION | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | THE NIELSEN COMPANY US , LLC | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | TNC US HOLDINGS, INC | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | TCG DIVESTITURE INC | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | ATHENIAN LEASING CORPORATION | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | ART HOLDING, L L C | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | A C NIELSEN COMPANY, LLC | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | NIELSEN FINANCE CO | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | NIELSEN CONSUMER NEUROSCIENCE, INC | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | NIELSEN CONSUMER INSIGHTS, INC | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | NIELSEN AUDIO, INC | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | ACN HOLDINGS INC | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | NETRATINGS, LLC | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | GRACENOTE MEDIA SERVICES, LLC | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | GRACENOTE, INC | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | EXELATE, INC | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | CZT ACN TRADEMARKS, L L C | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | ATHENIAN LEASING CORPORATION | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | ART HOLDING, L L C | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | AFFINNOVA, INC | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | ACNIELSEN ERATINGS COM | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | ACNIELSEN CORPORATION | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | NIELSEN INTERNATIONAL HOLDINGS, INC | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | NIELSEN MOBILE, LLC | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | NIELSEN UK FINANCE I, LLC | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | ACNIELSEN ERATINGS COM | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | ACNIELSEN CORPORATION | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | ACN HOLDINGS INC | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | A C NIELSEN COMPANY, LLC | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | NMR LICENSING ASSOCIATES, L P | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | NIELSEN HOLDING AND FINANCE B V | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | THE NIELSEN COMPANY B V | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | VNU INTERNATIONAL B V | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | AFFINNOVA, INC | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | VNU MARKETING INFORMATION, INC | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | A C NIELSEN ARGENTINA S A | CITIBANK, N A | CORRECTIVE ASSIGNMENT TO CORRECT THE PATENTS LISTED ON SCHEDULE 1 RECORDED ON 6-9-2020 PREVIOUSLY RECORDED ON REEL 053473 FRAME 0001 ASSIGNOR S HEREBY CONFIRMS THE SUPPLEMENTAL IP SECURITY AGREEMENT | 054066 | /0064 | |
Jun 04 2020 | NMR INVESTING I, INC | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | TCG DIVESTITURE INC | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | VIZU CORPORATION | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | TNC US HOLDINGS, INC | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jun 04 2020 | THE NIELSEN COMPANY US , LLC | CITIBANK, N A | SUPPLEMENTAL SECURITY AGREEMENT | 053473 | /0001 | |
Jan 27 2022 | QTERICS, INC | THE NIELSEN COMPANY US , LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 058915 | /0773 | |
Feb 15 2022 | QTERICS, INC | UNIVERSAL ELECTRONICS INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 059102 | /0314 | |
Feb 15 2022 | THE NIELSEN COMPANY US , LLC | UNIVERSAL ELECTRONICS INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 059102 | /0314 | |
Mar 18 2022 | CITIBANK, N A | THE NIELSEN COMPANY US , LLC | PARTIAL RELEASE OF SECURITY INTEREST | 059452 | /0243 | |
Oct 11 2022 | CITIBANK, N A | GRACENOTE, INC | RELEASE REEL 053473 FRAME 0001 | 063603 | /0001 | |
Oct 11 2022 | CITIBANK, N A | NETRATINGS, LLC | RELEASE REEL 054066 FRAME 0064 | 063605 | /0001 | |
Oct 11 2022 | CITIBANK, N A | A C NIELSEN COMPANY, LLC | RELEASE REEL 053473 FRAME 0001 | 063603 | /0001 | |
Oct 11 2022 | CITIBANK, N A | EXELATE, INC | RELEASE REEL 053473 FRAME 0001 | 063603 | /0001 | |
Oct 11 2022 | CITIBANK, N A | GRACENOTE MEDIA SERVICES, LLC | RELEASE REEL 053473 FRAME 0001 | 063603 | /0001 | |
Oct 11 2022 | CITIBANK, N A | THE NIELSEN COMPANY US , LLC | RELEASE REEL 053473 FRAME 0001 | 063603 | /0001 | |
Oct 11 2022 | CITIBANK, N A | A C NIELSEN COMPANY, LLC | RELEASE REEL 054066 FRAME 0064 | 063605 | /0001 | |
Oct 11 2022 | CITIBANK, N A | EXELATE, INC | RELEASE REEL 054066 FRAME 0064 | 063605 | /0001 | |
Oct 11 2022 | CITIBANK, N A | GRACENOTE, INC | RELEASE REEL 054066 FRAME 0064 | 063605 | /0001 | |
Oct 11 2022 | CITIBANK, N A | GRACENOTE MEDIA SERVICES, LLC | RELEASE REEL 054066 FRAME 0064 | 063605 | /0001 | |
Oct 11 2022 | CITIBANK, N A | THE NIELSEN COMPANY US , LLC | RELEASE REEL 054066 FRAME 0064 | 063605 | /0001 | |
Oct 11 2022 | CITIBANK, N A | NETRATINGS, LLC | RELEASE REEL 053473 FRAME 0001 | 063603 | /0001 |
Date | Maintenance Fee Events |
Mar 11 2019 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Date | Maintenance Schedule |
May 03 2025 | 4 years fee payment window open |
Nov 03 2025 | 6 months grace period start (w surcharge) |
May 03 2026 | patent expiry (for year 4) |
May 03 2028 | 2 years to revive unintentionally abandoned end. (for year 4) |
May 03 2029 | 8 years fee payment window open |
Nov 03 2029 | 6 months grace period start (w surcharge) |
May 03 2030 | patent expiry (for year 8) |
May 03 2032 | 2 years to revive unintentionally abandoned end. (for year 8) |
May 03 2033 | 12 years fee payment window open |
Nov 03 2033 | 6 months grace period start (w surcharge) |
May 03 2034 | patent expiry (for year 12) |
May 03 2036 | 2 years to revive unintentionally abandoned end. (for year 12) |